Solved

Identify high resource job / tasks in SQL Server 2008

Posted on 2014-01-15
2
319 Views
Last Modified: 2014-01-18
How can I identify a long running sql, procedure or jobs in SQL 2008 server ?

Tks
0
Comment
Question by:AXISHK
2 Comments
 
LVL 13

Assisted Solution

by:magarity
magarity earned 200 total points
ID: 39784469
Just use the Profiler tool that comes with sql server. Look for queries that have an excessive number of reads. The profiler will also let you browse the execution plans of running queries so you can look for table scans,  etc.
0
 
LVL 35

Accepted Solution

by:
David Todd earned 300 total points
ID: 39787639
Hi,

In SQL 2005 Microsoft introduced DMVs and in-built reports.

I suggest first off, that in SSMS, in Object Explorer, right click on the server, and click on reports, and look for Standard Reports, Performance - Top Queries by Total CPU.

Not strictly what you are after, but may help.

Also look at sp_who2. Connections with a high value in CPU or Disk might have issues and fit your criteria of long running.

HTH
  David
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Use this article to create a batch file to backup a Microsoft SQL Server database to a Windows folder.  The folder can be on the local hard drive or on a network share.  This batch file will query the SQL server to get the current date & time and wi…
This article explains how to reset the password of the sa account on a Microsoft SQL Server.  The steps in this article work in SQL 2005, 2008, 2008 R2, 2012, 2014 and 2016.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question